US20180232513A1 - Facilitating resolution of a human authentication test - Google Patents
Facilitating resolution of a human authentication test Download PDFInfo
- Publication number
- US20180232513A1 US20180232513A1 US15/430,712 US201715430712A US2018232513A1 US 20180232513 A1 US20180232513 A1 US 20180232513A1 US 201715430712 A US201715430712 A US 201715430712A US 2018232513 A1 US2018232513 A1 US 2018232513A1
- Authority
- US
- United States
- Prior art keywords
- image
- authentication
- text
- authentication server
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 64
- 238000000034 method Methods 0.000 claims abstract description 59
- 230000006855 networking Effects 0.000 claims description 26
- 230000001737 promoting effect Effects 0.000 claims description 17
- 238000004422 calculation algorithm Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 11
- 238000003909 pattern recognition Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 13
- 238000012545 processing Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 230000008901 benefit Effects 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 241000282412 Homo Species 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000012015 optical character recognition Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H04L67/42—
Definitions
- the various embodiments described herein generally relate to human authentication test resolution. More specifically, the various embodiments describe techniques of facilitating resolution of a human authentication test via an application configured to interface with an authentication server system.
- Bots are scripts designed to emulate humans in the context of online communications. Bots may present numerous security and performance difficulties with regard to an online website or application, including unsolicited electronic mail, Distributed Denial of Service attacks, fraudulent website traffic, etc. Many online entities have opted to address bots by including a human authentication test such as a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Human authentication tests are designed to distinguish humans from bots by requiring a certain action by a user, e.g., entry of designated text or selection of a designated option.
- a human authentication test such as a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA).
- Human authentication tests are designed to distinguish humans from bots by requiring a certain action by a user, e.g., entry of designated text or selection of a designated option.
- An associated method may include facilitating scanning of at least one image of a human authentication test from an interface of a client application.
- the human authentication test may be received from an image server of an authentication server system for display via the interface of the client application.
- the at least one image may be scanned via an image capture device.
- the method further may include sending to an authentication server of the authentication server system the at least one image.
- the method further may include receiving from the authentication server authentication text corresponding to the at least one image and displaying the authentication text.
- the method further may include displaying promotional information relating to one or more images among the at least one image. According to such embodiment, the method further may include, responsive to a user interacting with the promotional information, identifying attributes relating to the user. In an additional embodiment, the method further may include displaying educational information relating to one or more images among the at least one image. In an additional embodiment, the method further may include displaying social networking indicia (e.g., links or icons) having a capability to relay information relating to one or more images among the at least one image to a social networking application. In an additional embodiment, the method further may include requesting from a user registration credentials as a condition of displaying the authentication text. According to such embodiment, the registration credentials may be used to facilitate collection of data relating to the user.
- the registration credentials may be used to facilitate collection of data relating to the user.
- the authentication server may determine the authentication text by analyzing the at least one image via at least one pattern recognition algorithm to create a plurality of bytes associated with the at least one image, comparing the plurality of bytes associated with the at least one image with database information to identify at least one matching object, and determining authentication text based upon the at least one matching object.
- the authentication server may determine the authentication text by decoding the at least one image to obtain image data, querying at least one database with the obtained image data, and determining query results based upon the obtained image data. The query results determined according to such embodiment may include the authentication text.
- An additional embodiment includes a computer program product including a computer readable storage medium having program instructions embodied therewith. According to such embodiment, the program instructions may be executable by a computing device to cause the computing device to perform one or more steps of above recited method.
- a further embodiment includes a system having a processor and a memory storing an application program, which, when executed on the processor, performs one or more steps of the above recited method.
- FIG. 1 illustrates a computing infrastructure, according to an embodiment.
- FIG. 2 illustrates a method of facilitating resolution of a human authentication test, according to an embodiment.
- FIG. 3 illustrates a method of determining authentication text via an authentication server, according to an embodiment.
- FIG. 4 illustrates a method of determining authentication text via an authentication server, according to an embodiment.
- FIGS. 5A-5C illustrate an example scenario involving a human authentication test addressed according to the various embodiments described herein.
- FIGS. 6A-6C illustrate a further example scenario involving a human authentication test addressed according to the various embodiments described herein.
- a human authentication test may provide at least one image to which the user is required to provide a response. More specifically, according to an embodiment, the human authentication test may require that the user identify at least one designated aspect of the at least one image (e.g., the central subject of the at least one image) in text form.
- the various embodiments described herein may have advantages over conventional techniques. Specifically, the various embodiments may facilitate user completion of a human authentication test having at least one image while preserving security against bots. Furthermore, the various embodiments may facilitate collection of user data by requesting user credentials or by tracking/storing user activity, including activity with respect to any educational and/or promotional information provided in association with at least one image of a human authentication test. Moreover, the various embodiments may facilitate user activity with respect to social networking by enabling a user to post information with respect to at least one image of a human authentication test. Some of the various embodiments may not include all such advantages, and such advantages are not necessarily required of all embodiments.
- the present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- memory stick a floppy disk
- a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
- a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network, and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions also may be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer readable program instructions also may be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- Cloud computing generally refers to the provision of scalable computing resources as a service over a network. More formally, cloud computing may be defined as a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- underlying technical architecture e.g., servers, storage, networks
- cloud computing allows a user to access virtual computing resources (e.g., storage, data, applications, and even complete virtualized computing systems) in the cloud, without regard for the underlying physical systems (or locations of those systems) used to provide the computing resources.
- cloud computing resources are provided to a user on a pay-per-use basis, where users are charged only for the computing resources actually used (e.g., an amount of storage space consumed by a user or a number of virtualized systems instantiated by the user).
- a user can access any of the resources that reside in the cloud at any time, and from anywhere across the Internet.
- workloads of a client computing system or server system running an application may be deployed to a computing cloud.
- cloud-based database systems, virtual machines, and a variety of other server applications may be used to manage such workloads.
- FIG. 1 illustrates a computing infrastructure 100 , according to an embodiment.
- computing infrastructure 100 includes a client computing system 105 , an authentication server system 135 , and an authentication device 165 , each of which may be connected to a communications network 195 .
- client computing system 105 may include a memory 107 , storage 109 , client input/output (I/O) device interface 111 , a central processing unit (CPU) 113 , and a client network interface 115 , all of which may be interconnected via interconnect 117 (e.g., a bus). Although shown as a single computing system, client computing system 105 is included to be representative of a single client or multiple clients. In an embodiment, client computing system 105 may be a thin client. Client computing system 105 according to the various embodiments described herein may be a mobile device (e.g., a smart phone, a feature phone, a tablet device, a laptop, etc.). Alternatively, client computing system 105 may be a stationary device (e.g., a desktop computer).
- client computing system 105 may be a stationary device (e.g., a desktop computer).
- Memory 107 may include a client application 119 .
- Client application 119 may be an online or network application configured for interfacing with authentication server system 135 , authentication device 165 , and/or other computing systems.
- Client application 119 may include an application interface 121 .
- application interface 121 may be a graphical user interface (GUI) with appropriate objects to display and interface with a human authentication test provided by authentication server system 135 .
- GUI graphical user interface
- application interface 121 may provide text boxes, radio buttons, drop down menus, and/or similar GUI objects for the purpose of submitting a response to a human authentication test.
- application interface 121 may provide an ability to enter one or more command lines in order to submit a response to a human authentication test.
- Storage 109 may include client application data 123 associated with client application 119 .
- Client I/O device interface 111 may be communicatively coupled to one or more client I/O devices 125 .
- CPU 113 is included in FIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like.
- Client network interface 115 may receive data from, and/or may transmit data to, authentication server system 135 and/or authentication device 165 via network 195 .
- Client computing system 105 may be configured to interface with other client or server systems in computing infrastructure 100 .
- Authentication server system 135 may include a memory 137 , storage 139 , a server I/O device interface 141 , a CPU 143 , and a server network interface 145 , all of which may be interconnected via interconnect 147 (e.g., a bus). Although shown as a single computing system, authentication server system 135 is included to be representative of a single server system or multiple server systems. Although authentication server system 135 is illustrated in FIG. 1 , computing infrastructure 100 may include any number of server systems.
- Memory 137 may include an authentication server 149 including an authentication server application 151 , an image server 153 including an image server application 155 , and a database management system (DBMS) 157 .
- DBMS database management system
- authentication server 149 and image server 153 may be included in separate server systems.
- image server 153 may host images to be displayed in a human authentication test.
- authentication server 149 or more specifically authentication server application 151 , may determine authentication text required in response to a human authentication test according to one or more of the various embodiments described herein.
- DBMS 157 is included to be representative of a single database management system or multiple database management systems.
- authentication server 149 and image server 153 each may interact with separate database management systems.
- access to image server 153 may be restricted with respect to client computing system 105 , authentication device 165 , and/or other computing systems associated with computing infrastructure 100 . Restricted access according to such embodiment may ensure security of images hosted for purposes of a human authentication test. According to such embodiment, communication with image server 153 via network 195 may be restricted to a single port. Additionally or alternatively, according to such embodiment, all data associated with such communication may be encrypted.
- Image server application 155 may send to DBMS 157 a database query request, and DBMS 157 may process such query.
- DBMS 157 may include a software application configured to manage databases 163 .
- Databases 163 may include one or more ontology trees or other ontological structures. While FIG. 1 illustrates three databases 163 , computing infrastructure 100 may include any number of databases.
- DBMS 157 may send one or more requests to remote databases (not shown) via network 195 .
- Server I/O device interface 141 may be communicatively coupled to one or more server I/O devices 164 .
- CPU 143 is included in FIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like.
- Server network interface 145 may receive data from, and/or may transmit data to, client computing system 105 and/or authentication device 165 via network 195 .
- authentication server application 151 may accept authentication requests sent by client computing system 105 to authentication server system 135 and/or may transmit data to client computing system 105 via server network interface 145 .
- authentication server application 151 may accept authentication requests sent by authentication device 165 to authentication server system 135 and/or may transmit data to authentication device 165 via server network interface 145 .
- Authentication device 165 may include a memory 171 , storage 173 , authentication input/output (I/O) device interface 175 , a central processing unit (CPU) 177 , and an authentication device network interface 179 , all of which may be interconnected via interconnect 181 (e.g., a bus). Although shown as a single computing system, authentication device 165 is included to be representative of an authentication device or multiple authentication devices. In an embodiment, authentication device 165 may be a thin client. Authentication device 165 according to the various embodiments described herein may be a mobile device (e.g., a smart phone, a feature phone, a tablet device, a laptop, etc.). Alternatively, authentication device 165 may be a stationary device (e.g., a desktop computer).
- I/O authentication input/output
- CPU central processing unit
- authentication device network interface 179 all of which may be interconnected via interconnect 181 (e.g., a bus).
- interconnect 181 e.g.,
- Memory 171 may include an authentication application 183 .
- Authentication application 183 may be an online or network application configured for interfacing with client computing system 105 , authentication server system 135 , and/or other computing systems. As further described herein, authentication application 183 may facilitate resolution of a human authentication test according to one or more of the various embodiments described herein.
- Authentication application 183 may include an application interface 185 .
- application interface 185 may be a graphical user interface (GUI) with appropriate objects to interface with a human authentication test provided by authentication server system 135 . According to such embodiment, application interface 185 may provide text boxes, radio buttons, drop down menus, and/or similar GUI objects for the purpose of displaying authentication text, promotional information, educational information, social networking indicia, and/or other aspects associated with a human authentication test.
- GUI graphical user interface
- Storage 173 may include authentication application data 187 associated with authentication application 183 .
- Authentication I/O device interface 175 may be communicatively coupled to one or more image capture devices 189 .
- the one or more image capture devices 189 may be incorporated into the authentication device 165 . Additionally or alternatively, functionality of the one or more image capture devices 189 may be incorporated into one or more devices independent from authentication device 165 .
- the one or more image capture devices 189 in the context of the various embodiments described herein may include scanning functions, photographic functions, and/or any other functions for the purpose of capturing image data or other data associated with an electronic or physical interface.
- the one or more image capture devices 189 may be configured to scan at least one image of a human authentication test displayed on an application interface, e.g., application interface 121 of client application 119 .
- CPU 177 is included in FIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like.
- Authentication device network interface 179 may receive data from, and/or may transmit data to, authentication server system 135 and/or client computing system 105 via network 195 .
- Authentication device 165 may be configured to interface with other computing systems, including other server systems, in computing infrastructure 100 .
- one or more functions related to facilitating resolution of a human authentication test may be incorporated into client computing system 105 .
- client application 119 and authentication application 183 may interface directly with each other within client computing system 105 for the purpose of transferring data related to resolving a human authentication test.
- one or more functions of the one or more image capture devices 189 may be incorporated directly into client computing system 105 .
- one or more functions related to facilitating resolution of a human authentication test may be executed externally to authentication device 165 .
- authentication application 183 may communicate with one or more applications external to authentication device 165 in order to obtain information or results related to human authentication test resolution.
- authentication server 149 may be stored externally to authentication server system 135 .
- authentication server application 151 may communicate with one or more applications external to authentication server system 135 in order to obtain some or all information related to such externally stored aspects.
- all or some aspects of image server 153 may be stored externally to authentication server system 135 .
- image server application 155 may communicate with one or more applications external to authentication server system 135 in order to obtain some or all information related to such externally stored aspects.
- FIG. 2 illustrates a method 200 of facilitating resolution of a human authentication test, according to an embodiment.
- One or more steps associated with the method 200 and the other methods described herein may be carried out in a client-server computing environment (e.g., computing infrastructure 100 ). Additionally or alternatively, one or more steps associated with the method 200 and the other methods described herein may be carried out within one or more workloads of a cloud computing environment. Additionally or alternatively, one or more steps associated with the method 200 and the other methods described herein may be carried out in a peer-to-peer network environment.
- An authentication application e.g., authentication application 183
- the authentication application may be located in an authentication device in the computing environment (e.g., authentication device 165 ).
- the authentication application may execute one or more steps of the method 200 upon a user of a client application of a client computing system (e.g., client application 119 of client computing system 105 ) encountering a human authentication test.
- a human authentication test For instance, the user may encounter the human authentication test on a network-accessible site (e.g., a webpage) accessed via a client application interface (e.g., application interface 121 ).
- the human authentication test may include at least one image with a request that the user enter text identifying at least one designated aspect of the at least one image (e.g., the central subject of the at least one image).
- the user may consult the authentication application of the authentication device in order to facilitate resolution of the human authentication test.
- the authentication application may send the at least one image scanned at step 205 to an authentication server of the authentication server system (e.g., authentication server 149 of authentication server system 135 ).
- the authentication application may receive from the authentication server authentication text corresponding to the at least one image.
- the authentication server upon receiving the at least one image at step 210 , the authentication server in turn may determine authentication text that corresponds to the at least one image of human authentication test and then may send the authentication text to the authentication application for receipt at step 215 .
- the authentication text may pertain to at least one designated aspect of the at least one image (e.g., the central subject of the at least one image). Specific embodiments with respect to the authentication server determining the authentication text are described further herein.
- the authentication application may display the authentication text, which the user may use to address the human authentication test. More specifically, the authentication application may display the authentication text corresponding to the at least one image of human authentication test via an interface of the authentication application (e.g., authentication application interface 185 ). Accordingly, the user of the client application may view the authentication text via the authentication application interface and may enter and submit the authentication text via the client application interface in response to the human authentication test.
- the authentication application may display the authentication text, which the user may use to address the human authentication test. More specifically, the authentication application may display the authentication text corresponding to the at least one image of human authentication test via an interface of the authentication application (e.g., authentication application interface 185 ). Accordingly, the user of the client application may view the authentication text via the authentication application interface and may enter and submit the authentication text via the client application interface in response to the human authentication test.
- the authentication application further may display promotional information relating to one or more images among the at least one image. More specifically, the authentication application may display the promotional information via the authentication application interface such that the user of the client application may consume and/or interact with the promotional information. For instance, the authentication application may provide one or more links to advertisements associated with at least one designated aspect of the at least one image (e.g., the central subject of the at least one image and/or aspects associated therewith).
- the authentication application in response to the user interacting with the promotional information, the authentication application may identify attributes relating to the user. For instance, the authentication application may identify a time at which the user viewed or interacted with the promotional information.
- the authentication application may identify the location at which the user viewed or interacted with the promotional information.
- the authentication application may track and store such identified attributes relating to the user, e.g., via a database.
- the authentication application may display the promotional information adjacent to the authentication text displayed at step 220 .
- the authentication application further may display educational information relating to one or more images among the at least one image.
- the authentication application may display the educational information via the authentication application interface such that the user may consume the educational information. For instance, assuming that the at least one image depicts a location, the authentication application may provide historical facts associated with the location and/or other facts relevant to the location. As another example, assuming that the at least one image depicts an automobile, the authentication application may provide facts with regard to various characteristics of the automobile. The authentication application may track and store user activities with respect to the educational information, e.g., via a database. The authentication application may display the educational information adjacent to the authentication text displayed at step 220 .
- the authentication application further may display social networking indicia. More specifically, the authentication application may display the social networking indicia via the authentication application interface such that the user of the client application may interact with such indicia. Such social networking indicia may have a capability to relay information relating to one or more images among the at least one image to a social networking application. Such social networking indicia may include at least one link or icon which, responsive to being selected by the user of the client application, may facilitate posting of information related to the at least one image to a social networking profile, group, or other entity associated with the user. The authentication application may display the social networking indicia adjacent to the authentication text displayed at step 220 .
- the social networking application associated with the social networking icon may post information relating to the at least one image to a profile of the user within the social networking application.
- the social networking application may be incorporated into the client computing system, the authentication device, or another computing system within the computing environment.
- a social networking interface associated with the social networking application may be incorporated into the client application and/or the authentication application.
- a social networking interface associated with the social networking application may be a separate entity within the client computing system, the authentication device, or another computing system within the computing environment.
- the authentication application may request from the user registration credentials as a condition of displaying the authentication text at step 220 . That is to say, display of the authentication text at step 220 may be contingent upon receipt of user registration credentials.
- the authentication application may use the registration credentials to facilitate collection of user data. Specifically, the authentication application may collect data with respect to quantity and/or frequency of user authentication requests. Such data may facilitate tracking, target advertising, statistical analysis, and/or identification of abusive users.
- the authentication application may relay such data to the authentication server system or another computing system within the computing environment.
- FIG. 3 illustrates a method 300 of determining the authentication text via the authentication server, according to an embodiment. Steps of the method 300 may be executed via an application in the authentication server (e.g., application server application 151 ).
- the method 300 may begin at step 305 , where the authentication server may analyze the at least one image via at least one pattern recognition algorithm to create a plurality of bytes associated with the at least one image. According to step 305 , the at least one image may be converted into a form compatible for comparison with database data.
- the authentication server may compare the plurality of bytes associated with the at least one image with database information (e.g., information from databases 163 ) to identify at least one matching object.
- database information e.g., information from databases 163
- the authentication server may determine authentication text based upon the at least one matching object identified at step 310 . Furthermore, the authentication server may determine metadata with respect to the authentication text. Such metadata may include the time at which the authentication text was determined. Such metadata further may include information with regard to any encryption algorithm used to secure the authentication text.
- FIG. 4 illustrates a method 400 of determining the authentication text via the authentication server, according to an embodiment.
- Steps of the method 400 may be executed via an application in the authentication server (e.g., application server application 151 ).
- the method 400 may begin at step 405 , where the authentication server may decode the at least one image to obtain image data.
- the decoding of the at least one image according to step 305 may incorporate use of an optical character recognition algorithm (OCR algorithm).
- OCR algorithm optical character recognition algorithm
- Decoding via an OCR algorithm may enable the authentication server to decode any textual aspect within the at least one image. For instance, assuming that the at least one image includes an automobile, decoding via an OCR algorithm may enable the authentication server to decode any visible text on a license plate associated with the automobile such that the decoded text may be included in the obtained image data.
- the authentication server may query at least one database with the image data obtained at step 405 (e.g., databases 163 may be queried via DBMS 157 ).
- the authentication server may determine query results based upon the obtained image data.
- the query results obtained at step 415 may include the authentication text.
- the query results may include metadata with respect to the authentication text.
- metadata may include the time at which the authentication text was obtained from the at least one database.
- metadata further may include information with regard to any encryption algorithm used to secure the authentication text.
- FIGS. 5A-5C illustrate an example scenario 500 according to the various embodiments described herein. Specifically, the example scenario 500 as depicted in FIGS. 5A-5C demonstrates how authentication application 183 of authentication device 165 may facilitate resolution of a human authentication test in accordance with the method 200 .
- client application interface 121 may display a human authentication test 505 having an image 510 .
- Image 510 pertains to a location.
- authentication application 183 of authentication device 165 may facilitate scanning of image 510 of human authentication test 505 .
- Image 510 may be scanned via one or more image capture devices 189 associated with authentication device 165 .
- Authentication application 183 may display a scanned version 515 of image 510 within authentication application interface 185 .
- authentication application 183 may send a scanned version 515 of image 510 to authentication server 149 of authentication server system 135 .
- authentication application 183 may receive from authentication server 149 authentication text corresponding to image 510 , and as illustrated in FIG. 5B authentication application 183 may display authentication text 520 within authentication application interface 185 . Furthermore, authentication application 183 may display within authentication application interface 185 educational information 525 relating to image 510 . As illustrated in FIG. 5C , the user of client application 119 may respond to human authentication test 505 by consulting authentication text 520 via authentication application interface 185 and then entering authentication text 520 in authentication text box 530 within client application interface 121 .
- FIGS. 6A-6C illustrate a further example scenario 600 according to the various embodiments described herein.
- the example scenario 600 as depicted in FIGS. 6A-6C demonstrates how authentication application 183 of authentication device 165 may facilitate resolution of a human authentication test in accordance with the method 200 .
- client application interface 121 may display a human authentication test 605 having an image 610 .
- Image 610 pertains to an object.
- authentication application 183 of authentication device 165 may facilitate scanning of image 610 of human authentication test 605 .
- Image 610 may be scanned via one or more image capture devices 189 associated with authentication device 165 .
- Authentication application 183 may display a scanned version 615 of image 610 within authentication application interface 185 .
- authentication application 183 may send scanned version 615 of image 610 to authentication server 149 of authentication server system 135 .
- authentication application 183 may receive from authentication server 149 authentication text corresponding to image 610 , and as illustrated in FIG. 6B authentication application 183 may display authentication text 620 within authentication application interface 185 . Furthermore, authentication application 183 may display within authentication application interface 185 promotional information 625 relating to image 610 . More specifically, promotional information 625 may include a link to a merchant selling merchandise relating to the object depicted in image 610 (according to example scenario 600 , the merchant may sell convertibles). As illustrated in FIG. 6C , the user of client application 119 may respond to human authentication test 605 by consulting authentication text 620 via authentication application interface 185 and then entering authentication text 620 in authentication text box 630 within client application interface 121 .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Primary Health Care (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Educational Technology (AREA)
- Educational Administration (AREA)
- Biomedical Technology (AREA)
- User Interface Of Digital Computer (AREA)
- Power Engineering (AREA)
Abstract
Description
- The various embodiments described herein generally relate to human authentication test resolution. More specifically, the various embodiments describe techniques of facilitating resolution of a human authentication test via an application configured to interface with an authentication server system.
- Bots are scripts designed to emulate humans in the context of online communications. Bots may present numerous security and performance difficulties with regard to an online website or application, including unsolicited electronic mail, Distributed Denial of Service attacks, fraudulent website traffic, etc. Many online entities have opted to address bots by including a human authentication test such as a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Human authentication tests are designed to distinguish humans from bots by requiring a certain action by a user, e.g., entry of designated text or selection of a designated option.
- The various embodiments described herein provide techniques of facilitating resolution of a human authentication test. An associated method may include facilitating scanning of at least one image of a human authentication test from an interface of a client application. The human authentication test may be received from an image server of an authentication server system for display via the interface of the client application. The at least one image may be scanned via an image capture device. The method further may include sending to an authentication server of the authentication server system the at least one image. The method further may include receiving from the authentication server authentication text corresponding to the at least one image and displaying the authentication text.
- In an embodiment, the method further may include displaying promotional information relating to one or more images among the at least one image. According to such embodiment, the method further may include, responsive to a user interacting with the promotional information, identifying attributes relating to the user. In an additional embodiment, the method further may include displaying educational information relating to one or more images among the at least one image. In an additional embodiment, the method further may include displaying social networking indicia (e.g., links or icons) having a capability to relay information relating to one or more images among the at least one image to a social networking application. In an additional embodiment, the method further may include requesting from a user registration credentials as a condition of displaying the authentication text. According to such embodiment, the registration credentials may be used to facilitate collection of data relating to the user.
- In a further embodiment, the authentication server may determine the authentication text by analyzing the at least one image via at least one pattern recognition algorithm to create a plurality of bytes associated with the at least one image, comparing the plurality of bytes associated with the at least one image with database information to identify at least one matching object, and determining authentication text based upon the at least one matching object. In a further alternative embodiment, the authentication server may determine the authentication text by decoding the at least one image to obtain image data, querying at least one database with the obtained image data, and determining query results based upon the obtained image data. The query results determined according to such embodiment may include the authentication text.
- An additional embodiment includes a computer program product including a computer readable storage medium having program instructions embodied therewith. According to such embodiment, the program instructions may be executable by a computing device to cause the computing device to perform one or more steps of above recited method. A further embodiment includes a system having a processor and a memory storing an application program, which, when executed on the processor, performs one or more steps of the above recited method.
- So that the manner in which the above recited aspects are attained and can be understood in detail, a more particular description of embodiments, briefly summarized above, may be had by reference to the appended drawings.
- Note, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
-
FIG. 1 illustrates a computing infrastructure, according to an embodiment. -
FIG. 2 illustrates a method of facilitating resolution of a human authentication test, according to an embodiment. -
FIG. 3 illustrates a method of determining authentication text via an authentication server, according to an embodiment. -
FIG. 4 illustrates a method of determining authentication text via an authentication server, according to an embodiment. -
FIGS. 5A-5C illustrate an example scenario involving a human authentication test addressed according to the various embodiments described herein. -
FIGS. 6A-6C illustrate a further example scenario involving a human authentication test addressed according to the various embodiments described herein. - The various embodiments described herein are directed to techniques of facilitating resolution of a human authentication test, such as a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). In the context of the various embodiments described herein, for the purpose of ensuring that a user is human, a human authentication test may provide at least one image to which the user is required to provide a response. More specifically, according to an embodiment, the human authentication test may require that the user identify at least one designated aspect of the at least one image (e.g., the central subject of the at least one image) in text form.
- The various embodiments described herein may have advantages over conventional techniques. Specifically, the various embodiments may facilitate user completion of a human authentication test having at least one image while preserving security against bots. Furthermore, the various embodiments may facilitate collection of user data by requesting user credentials or by tracking/storing user activity, including activity with respect to any educational and/or promotional information provided in association with at least one image of a human authentication test. Moreover, the various embodiments may facilitate user activity with respect to social networking by enabling a user to post information with respect to at least one image of a human authentication test. Some of the various embodiments may not include all such advantages, and such advantages are not necessarily required of all embodiments.
- In the following, reference is made to various embodiments of the invention. However, it should be understood that the invention is not limited to specific described embodiments. Instead, any combination of the following features and elements, whether related to different embodiments or not, is contemplated to implement and practice the invention. Furthermore, although embodiments may achieve advantages over other possible solutions and/or over the prior art, whether or not a particular advantage is achieved by a given embodiment is not limiting. Thus, the following aspects, features, embodiments, and advantages are merely illustrative and are not considered elements or limitations of the appended claims except where explicitly recited in a claim(s) Likewise, reference to “the invention” shall not be construed as a generalization of any inventive subject matter disclosed herein and shall not be considered to be an element or limitation of the appended claims except where explicitly recited in a claim(s).
- The present invention may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
- The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network, and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions also may be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer readable program instructions also may be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
- The various embodiments described herein may be provided to end users through a cloud computing infrastructure. Cloud computing generally refers to the provision of scalable computing resources as a service over a network. More formally, cloud computing may be defined as a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Thus, cloud computing allows a user to access virtual computing resources (e.g., storage, data, applications, and even complete virtualized computing systems) in the cloud, without regard for the underlying physical systems (or locations of those systems) used to provide the computing resources.
- Typically, cloud computing resources are provided to a user on a pay-per-use basis, where users are charged only for the computing resources actually used (e.g., an amount of storage space consumed by a user or a number of virtualized systems instantiated by the user). A user can access any of the resources that reside in the cloud at any time, and from anywhere across the Internet. In context of this disclosure, workloads of a client computing system or server system running an application according to the various embodiments described herein may be deployed to a computing cloud. Moreover, cloud-based database systems, virtual machines, and a variety of other server applications may be used to manage such workloads.
- Particular embodiments describe techniques of facilitating resolution of a human authentication test. However, it should be understood that the techniques described herein may be adapted to a variety of purposes in addition to those specifically described herein. Accordingly, references to specific embodiments are included to be illustrative and not limiting.
-
FIG. 1 illustrates acomputing infrastructure 100, according to an embodiment. As shown,computing infrastructure 100 includes aclient computing system 105, anauthentication server system 135, and anauthentication device 165, each of which may be connected to acommunications network 195. - Illustratively,
client computing system 105 may include amemory 107,storage 109, client input/output (I/O)device interface 111, a central processing unit (CPU) 113, and aclient network interface 115, all of which may be interconnected via interconnect 117 (e.g., a bus). Although shown as a single computing system,client computing system 105 is included to be representative of a single client or multiple clients. In an embodiment,client computing system 105 may be a thin client.Client computing system 105 according to the various embodiments described herein may be a mobile device (e.g., a smart phone, a feature phone, a tablet device, a laptop, etc.). Alternatively,client computing system 105 may be a stationary device (e.g., a desktop computer). -
Memory 107 may include aclient application 119.Client application 119 may be an online or network application configured for interfacing withauthentication server system 135,authentication device 165, and/or other computing systems.Client application 119 may include anapplication interface 121. In an embodiment,application interface 121 may be a graphical user interface (GUI) with appropriate objects to display and interface with a human authentication test provided byauthentication server system 135. According to such embodiment,application interface 121 may provide text boxes, radio buttons, drop down menus, and/or similar GUI objects for the purpose of submitting a response to a human authentication test. Additionally or alternatively,application interface 121 may provide an ability to enter one or more command lines in order to submit a response to a human authentication test. -
Storage 109 may includeclient application data 123 associated withclient application 119. Client I/O device interface 111 may be communicatively coupled to one or more client I/O devices 125.CPU 113 is included inFIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like.Client network interface 115 may receive data from, and/or may transmit data to,authentication server system 135 and/orauthentication device 165 vianetwork 195.Client computing system 105 may be configured to interface with other client or server systems incomputing infrastructure 100. -
Authentication server system 135 may include amemory 137,storage 139, a server I/O device interface 141, aCPU 143, and aserver network interface 145, all of which may be interconnected via interconnect 147 (e.g., a bus). Although shown as a single computing system,authentication server system 135 is included to be representative of a single server system or multiple server systems. Althoughauthentication server system 135 is illustrated inFIG. 1 ,computing infrastructure 100 may include any number of server systems.Memory 137 may include anauthentication server 149 including anauthentication server application 151, animage server 153 including animage server application 155, and a database management system (DBMS) 157. In an alternative embodiment,authentication server 149 andimage server 153 may be included in separate server systems. In the context of the various embodiments described herein,image server 153 may host images to be displayed in a human authentication test. As further described herein,authentication server 149, or more specificallyauthentication server application 151, may determine authentication text required in response to a human authentication test according to one or more of the various embodiments described herein.DBMS 157 is included to be representative of a single database management system or multiple database management systems. According to a further embodiment,authentication server 149 andimage server 153 each may interact with separate database management systems. - According to a further embodiment, access to
image server 153 may be restricted with respect toclient computing system 105,authentication device 165, and/or other computing systems associated withcomputing infrastructure 100. Restricted access according to such embodiment may ensure security of images hosted for purposes of a human authentication test. According to such embodiment, communication withimage server 153 vianetwork 195 may be restricted to a single port. Additionally or alternatively, according to such embodiment, all data associated with such communication may be encrypted. -
Storage 139 may include authenticationserver application data 159, imageserver application data 161, anddatabases 163.Authentication server application 151 may generate and process authenticationserver application data 159 based upon interaction withclient computing system 105,authentication device 165, and/or one or more other systems vianetwork 195.Image server application 155 may process imageserver application data 161 based upon interaction withclient computing system 105,authentication device 165, and/or one or more other systems vianetwork 195.Authentication server application 151 may send to DBMS 157 a database query request (e.g., a query received from client computing system 105), andDBMS 157 may process such query.Image server application 155 may send to DBMS 157 a database query request, andDBMS 157 may process such query.DBMS 157 may include a software application configured to managedatabases 163.Databases 163 may include one or more ontology trees or other ontological structures. WhileFIG. 1 illustrates threedatabases 163,computing infrastructure 100 may include any number of databases. According to an embodiment,DBMS 157 may send one or more requests to remote databases (not shown) vianetwork 195. - Server I/
O device interface 141 may be communicatively coupled to one or more server I/O devices 164.CPU 143 is included inFIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like.Server network interface 145 may receive data from, and/or may transmit data to,client computing system 105 and/orauthentication device 165 vianetwork 195. Specifically,authentication server application 151 may accept authentication requests sent byclient computing system 105 toauthentication server system 135 and/or may transmit data toclient computing system 105 viaserver network interface 145. Furthermore,authentication server application 151 may accept authentication requests sent byauthentication device 165 toauthentication server system 135 and/or may transmit data toauthentication device 165 viaserver network interface 145. -
Authentication device 165 may include amemory 171,storage 173, authentication input/output (I/O)device interface 175, a central processing unit (CPU) 177, and an authenticationdevice network interface 179, all of which may be interconnected via interconnect 181 (e.g., a bus). Although shown as a single computing system,authentication device 165 is included to be representative of an authentication device or multiple authentication devices. In an embodiment,authentication device 165 may be a thin client.Authentication device 165 according to the various embodiments described herein may be a mobile device (e.g., a smart phone, a feature phone, a tablet device, a laptop, etc.). Alternatively,authentication device 165 may be a stationary device (e.g., a desktop computer). -
Memory 171 may include anauthentication application 183.Authentication application 183 may be an online or network application configured for interfacing withclient computing system 105,authentication server system 135, and/or other computing systems. As further described herein,authentication application 183 may facilitate resolution of a human authentication test according to one or more of the various embodiments described herein.Authentication application 183 may include anapplication interface 185. In an embodiment,application interface 185 may be a graphical user interface (GUI) with appropriate objects to interface with a human authentication test provided byauthentication server system 135. According to such embodiment,application interface 185 may provide text boxes, radio buttons, drop down menus, and/or similar GUI objects for the purpose of displaying authentication text, promotional information, educational information, social networking indicia, and/or other aspects associated with a human authentication test. -
Storage 173 may includeauthentication application data 187 associated withauthentication application 183. Authentication I/O device interface 175 may be communicatively coupled to one or moreimage capture devices 189. The one or moreimage capture devices 189 may be incorporated into theauthentication device 165. Additionally or alternatively, functionality of the one or moreimage capture devices 189 may be incorporated into one or more devices independent fromauthentication device 165. The one or moreimage capture devices 189 in the context of the various embodiments described herein may include scanning functions, photographic functions, and/or any other functions for the purpose of capturing image data or other data associated with an electronic or physical interface. More specifically, the one or moreimage capture devices 189 may be configured to scan at least one image of a human authentication test displayed on an application interface, e.g.,application interface 121 ofclient application 119.CPU 177 is included inFIG. 1 to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, or the like. Authenticationdevice network interface 179 may receive data from, and/or may transmit data to,authentication server system 135 and/orclient computing system 105 vianetwork 195.Authentication device 165 may be configured to interface with other computing systems, including other server systems, incomputing infrastructure 100. - In an alternative embodiment, one or more functions related to facilitating resolution of a human authentication test according to the various embodiments described herein may be incorporated into
client computing system 105. According to such alternative embodiment,client application 119 andauthentication application 183 may interface directly with each other withinclient computing system 105 for the purpose of transferring data related to resolving a human authentication test. Additionally, according to such alternative embodiment, one or more functions of the one or moreimage capture devices 189 may be incorporated directly intoclient computing system 105. - In a further alternative embodiment, one or more functions related to facilitating resolution of a human authentication test according to the various embodiments described herein may be executed externally to
authentication device 165. According to such alternative embodiment,authentication application 183 may communicate with one or more applications external toauthentication device 165 in order to obtain information or results related to human authentication test resolution. - In a further alternative embodiment, all or some aspects of
authentication server 149 may be stored externally toauthentication server system 135. According to such alternative embodiment,authentication server application 151 may communicate with one or more applications external toauthentication server system 135 in order to obtain some or all information related to such externally stored aspects. In a further alternative embodiment, all or some aspects ofimage server 153 may be stored externally toauthentication server system 135. According to such alternative embodiment,image server application 155 may communicate with one or more applications external toauthentication server system 135 in order to obtain some or all information related to such externally stored aspects. -
FIG. 2 illustrates amethod 200 of facilitating resolution of a human authentication test, according to an embodiment. One or more steps associated with themethod 200 and the other methods described herein may be carried out in a client-server computing environment (e.g., computing infrastructure 100). Additionally or alternatively, one or more steps associated with themethod 200 and the other methods described herein may be carried out within one or more workloads of a cloud computing environment. Additionally or alternatively, one or more steps associated with themethod 200 and the other methods described herein may be carried out in a peer-to-peer network environment. An authentication application (e.g., authentication application 183) may facilitate processing according to themethod 200. The authentication application may be located in an authentication device in the computing environment (e.g., authentication device 165). The authentication application may execute one or more steps of themethod 200 upon a user of a client application of a client computing system (e.g.,client application 119 of client computing system 105) encountering a human authentication test. For instance, the user may encounter the human authentication test on a network-accessible site (e.g., a webpage) accessed via a client application interface (e.g., application interface 121). In an embodiment, the human authentication test may include at least one image with a request that the user enter text identifying at least one designated aspect of the at least one image (e.g., the central subject of the at least one image). The user may consult the authentication application of the authentication device in order to facilitate resolution of the human authentication test. - The
method 200 may begin atstep 205, where the authentication application may facilitate scanning of the at least one image of the human authentication test from the client application interface. The at least one image of the human authentication test may be received from an image server of an authentication server system (e.g.,image server 153 of authentication server system 135) for display via the client application interface. Furthermore, the at least one image of the human authentication test may be hosted by the image server. The at least one image may be encrypted for security purposes. The authentication application may facilitate scanning of the at least one image via one or more image capture devices (e.g., image capture device 189) associated with the authentication device. The authentication application may facilitate scanning of the at least one image according to step 205 by directing the one or more image capture devices to capture a photograph of the at least one image or otherwise capture image data with respect to the at least one image. - At
step 210, the authentication application may send the at least one image scanned atstep 205 to an authentication server of the authentication server system (e.g.,authentication server 149 of authentication server system 135). Atstep 215, the authentication application may receive from the authentication server authentication text corresponding to the at least one image. Specifically, upon receiving the at least one image atstep 210, the authentication server in turn may determine authentication text that corresponds to the at least one image of human authentication test and then may send the authentication text to the authentication application for receipt atstep 215. The authentication text may pertain to at least one designated aspect of the at least one image (e.g., the central subject of the at least one image). Specific embodiments with respect to the authentication server determining the authentication text are described further herein. - At
step 220, the authentication application may display the authentication text, which the user may use to address the human authentication test. More specifically, the authentication application may display the authentication text corresponding to the at least one image of human authentication test via an interface of the authentication application (e.g., authentication application interface 185). Accordingly, the user of the client application may view the authentication text via the authentication application interface and may enter and submit the authentication text via the client application interface in response to the human authentication test. - In an embodiment, at
step 220 the authentication application further may display promotional information relating to one or more images among the at least one image. More specifically, the authentication application may display the promotional information via the authentication application interface such that the user of the client application may consume and/or interact with the promotional information. For instance, the authentication application may provide one or more links to advertisements associated with at least one designated aspect of the at least one image (e.g., the central subject of the at least one image and/or aspects associated therewith). In a further embodiment, in response to the user interacting with the promotional information, the authentication application may identify attributes relating to the user. For instance, the authentication application may identify a time at which the user viewed or interacted with the promotional information. Furthermore, the authentication application may identify the location at which the user viewed or interacted with the promotional information. The authentication application may track and store such identified attributes relating to the user, e.g., via a database. The authentication application may display the promotional information adjacent to the authentication text displayed atstep 220. - In an additional embodiment, at
step 220 the authentication application further may display educational information relating to one or more images among the at least one image. - More specifically, the authentication application may display the educational information via the authentication application interface such that the user may consume the educational information. For instance, assuming that the at least one image depicts a location, the authentication application may provide historical facts associated with the location and/or other facts relevant to the location. As another example, assuming that the at least one image depicts an automobile, the authentication application may provide facts with regard to various characteristics of the automobile. The authentication application may track and store user activities with respect to the educational information, e.g., via a database. The authentication application may display the educational information adjacent to the authentication text displayed at
step 220. - In an additional embodiment, at
step 220 the authentication application further may display social networking indicia. More specifically, the authentication application may display the social networking indicia via the authentication application interface such that the user of the client application may interact with such indicia. Such social networking indicia may have a capability to relay information relating to one or more images among the at least one image to a social networking application. Such social networking indicia may include at least one link or icon which, responsive to being selected by the user of the client application, may facilitate posting of information related to the at least one image to a social networking profile, group, or other entity associated with the user. The authentication application may display the social networking indicia adjacent to the authentication text displayed atstep 220. For instance, upon selection by the user of a social networking icon adjacent to the authentication text, the social networking application associated with the social networking icon may post information relating to the at least one image to a profile of the user within the social networking application. The social networking application may be incorporated into the client computing system, the authentication device, or another computing system within the computing environment. In an embodiment, a social networking interface associated with the social networking application may be incorporated into the client application and/or the authentication application. Alternatively, a social networking interface associated with the social networking application may be a separate entity within the client computing system, the authentication device, or another computing system within the computing environment. - In a further embodiment, the authentication application may request from the user registration credentials as a condition of displaying the authentication text at
step 220. That is to say, display of the authentication text atstep 220 may be contingent upon receipt of user registration credentials. According to such embodiment, the authentication application may use the registration credentials to facilitate collection of user data. Specifically, the authentication application may collect data with respect to quantity and/or frequency of user authentication requests. Such data may facilitate tracking, target advertising, statistical analysis, and/or identification of abusive users. In an embodiment, the authentication application may relay such data to the authentication server system or another computing system within the computing environment. -
FIG. 3 illustrates amethod 300 of determining the authentication text via the authentication server, according to an embodiment. Steps of themethod 300 may be executed via an application in the authentication server (e.g., application server application 151). Themethod 300 may begin atstep 305, where the authentication server may analyze the at least one image via at least one pattern recognition algorithm to create a plurality of bytes associated with the at least one image. According to step 305, the at least one image may be converted into a form compatible for comparison with database data. Atstep 310, the authentication server may compare the plurality of bytes associated with the at least one image with database information (e.g., information from databases 163) to identify at least one matching object. - At
step 315 of themethod 300, the authentication server may determine authentication text based upon the at least one matching object identified atstep 310. Furthermore, the authentication server may determine metadata with respect to the authentication text. Such metadata may include the time at which the authentication text was determined. Such metadata further may include information with regard to any encryption algorithm used to secure the authentication text. -
FIG. 4 illustrates amethod 400 of determining the authentication text via the authentication server, according to an embodiment. Steps of themethod 400 may be executed via an application in the authentication server (e.g., application server application 151). Themethod 400 may begin atstep 405, where the authentication server may decode the at least one image to obtain image data. In an embodiment, the decoding of the at least one image according to step 305 may incorporate use of an optical character recognition algorithm (OCR algorithm). Decoding via an OCR algorithm may enable the authentication server to decode any textual aspect within the at least one image. For instance, assuming that the at least one image includes an automobile, decoding via an OCR algorithm may enable the authentication server to decode any visible text on a license plate associated with the automobile such that the decoded text may be included in the obtained image data. - At
step 410 of themethod 400, the authentication server may query at least one database with the image data obtained at step 405 (e.g.,databases 163 may be queried via DBMS 157). Atstep 415, the authentication server may determine query results based upon the obtained image data. The query results obtained atstep 415 may include the authentication text. Furthermore, the query results may include metadata with respect to the authentication text. Such metadata may include the time at which the authentication text was obtained from the at least one database. Such metadata further may include information with regard to any encryption algorithm used to secure the authentication text. -
FIGS. 5A-5C illustrate anexample scenario 500 according to the various embodiments described herein. Specifically, theexample scenario 500 as depicted inFIGS. 5A-5C demonstrates howauthentication application 183 ofauthentication device 165 may facilitate resolution of a human authentication test in accordance with themethod 200. - As shown in
FIG. 5A ,client application interface 121 may display ahuman authentication test 505 having animage 510.Image 510 pertains to a location. According to step 205 of themethod 200,authentication application 183 ofauthentication device 165 may facilitate scanning ofimage 510 ofhuman authentication test 505.Image 510 may be scanned via one or moreimage capture devices 189 associated withauthentication device 165.Authentication application 183 may display a scannedversion 515 ofimage 510 withinauthentication application interface 185. According to step 210,authentication application 183 may send a scannedversion 515 ofimage 510 toauthentication server 149 ofauthentication server system 135. - According to
steps authentication application 183 may receive fromauthentication server 149 authentication text corresponding to image 510, and as illustrated inFIG. 5B authentication application 183 may displayauthentication text 520 withinauthentication application interface 185. Furthermore,authentication application 183 may display withinauthentication application interface 185educational information 525 relating toimage 510. As illustrated inFIG. 5C , the user ofclient application 119 may respond tohuman authentication test 505 by consultingauthentication text 520 viaauthentication application interface 185 and then enteringauthentication text 520 inauthentication text box 530 withinclient application interface 121. -
FIGS. 6A-6C illustrate afurther example scenario 600 according to the various embodiments described herein. Specifically, theexample scenario 600 as depicted inFIGS. 6A-6C demonstrates howauthentication application 183 ofauthentication device 165 may facilitate resolution of a human authentication test in accordance with themethod 200. - As shown in
FIG. 6A ,client application interface 121 may display ahuman authentication test 605 having animage 610.Image 610 pertains to an object. According to step 205 of themethod 200,authentication application 183 ofauthentication device 165 may facilitate scanning ofimage 610 ofhuman authentication test 605.Image 610 may be scanned via one or moreimage capture devices 189 associated withauthentication device 165.Authentication application 183 may display a scannedversion 615 ofimage 610 withinauthentication application interface 185. According to step 210,authentication application 183 may send scannedversion 615 ofimage 610 toauthentication server 149 ofauthentication server system 135. - According to
steps authentication application 183 may receive fromauthentication server 149 authentication text corresponding to image 610, and as illustrated inFIG. 6B authentication application 183 may displayauthentication text 620 withinauthentication application interface 185. Furthermore,authentication application 183 may display withinauthentication application interface 185promotional information 625 relating toimage 610. More specifically,promotional information 625 may include a link to a merchant selling merchandise relating to the object depicted in image 610 (according toexample scenario 600, the merchant may sell convertibles). As illustrated inFIG. 6C , the user ofclient application 119 may respond tohuman authentication test 605 by consultingauthentication text 620 viaauthentication application interface 185 and then enteringauthentication text 620 inauthentication text box 630 withinclient application interface 121. - The descriptions of the various embodiments of the present invention have been presented for purposes of illustration but are not intended to be exhaustive or limited to the embodiments disclosed. All kinds of modifications made to the described embodiments and equivalent arrangements should fall within the protected scope of the invention. Hence, the scope of the invention should be explained most widely according to the claims that follow in connection with the detailed description, and should cover all possibly equivalent variations and equivalent arrangements. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments described herein.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/430,712 US10789351B2 (en) | 2017-02-13 | 2017-02-13 | Facilitating resolution of a human authentication test |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/430,712 US10789351B2 (en) | 2017-02-13 | 2017-02-13 | Facilitating resolution of a human authentication test |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180232513A1 true US20180232513A1 (en) | 2018-08-16 |
US10789351B2 US10789351B2 (en) | 2020-09-29 |
Family
ID=63105269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/430,712 Active 2037-10-10 US10789351B2 (en) | 2017-02-13 | 2017-02-13 | Facilitating resolution of a human authentication test |
Country Status (1)
Country | Link |
---|---|
US (1) | US10789351B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112311949A (en) * | 2019-07-31 | 2021-02-02 | 佳能株式会社 | Image forming apparatus, control method thereof, and storage medium storing computer program |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070026372A1 (en) * | 2005-07-27 | 2007-02-01 | Huelsbergen Lorenz F | Method for providing machine access security by deciding whether an anonymous responder is a human or a machine using a human interactive proof |
US20100318669A1 (en) * | 2009-06-16 | 2010-12-16 | Kevin Chugh | Human Interactive Proof System and Apparatus that Enables Public Contribution of Challenges for Determining Whether an Agent is a Computer or a Human |
US20110208716A1 (en) * | 2010-02-19 | 2011-08-25 | Microsoft Corporation | Image-Based CAPTCHA Exploiting Context in Object Recognition |
US20130254036A1 (en) * | 2012-03-23 | 2013-09-26 | John Trinh | Method and/or System for User Authentication with Targeted Electronic Advertising Content through Personal Communication Devices |
US20150006474A1 (en) * | 2013-06-28 | 2015-01-01 | Pingstripe, Inc | Secure cloud based document storage and management system and method |
US20150026785A1 (en) * | 2012-02-24 | 2015-01-22 | Nant Holdings Ip, Llc | Content Activation Via Interaction-Based Authentication, Systems and Method |
US20150304322A1 (en) * | 2014-04-16 | 2015-10-22 | iAccess Technologies Inc. | System and method for vascular mapping authentication |
US20160036798A1 (en) * | 2014-08-04 | 2016-02-04 | Mobile Search Security LLC | Secure mobile contact system (smcs) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606918B2 (en) | 2004-04-27 | 2009-10-20 | Microsoft Corporation | Account creation via a mobile device |
US8825034B2 (en) | 2008-09-17 | 2014-09-02 | Amdocs Software Systems Limited | System and method for using a computer as a bridge for data synchronization between a cellular device and a computer network |
US20130185210A1 (en) | 2011-10-21 | 2013-07-18 | The Board of Trustees of the Leland Stanford, Junior, University | Method and System for Making Digital Payments |
EP2775417A1 (en) | 2013-03-04 | 2014-09-10 | MFA Informatik AG | Computer implemented multi-factor authentication |
US9576194B2 (en) | 2014-10-13 | 2017-02-21 | Klink Technologies | Method and system for identity and age verification |
-
2017
- 2017-02-13 US US15/430,712 patent/US10789351B2/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070026372A1 (en) * | 2005-07-27 | 2007-02-01 | Huelsbergen Lorenz F | Method for providing machine access security by deciding whether an anonymous responder is a human or a machine using a human interactive proof |
US20100318669A1 (en) * | 2009-06-16 | 2010-12-16 | Kevin Chugh | Human Interactive Proof System and Apparatus that Enables Public Contribution of Challenges for Determining Whether an Agent is a Computer or a Human |
US20110208716A1 (en) * | 2010-02-19 | 2011-08-25 | Microsoft Corporation | Image-Based CAPTCHA Exploiting Context in Object Recognition |
US20150026785A1 (en) * | 2012-02-24 | 2015-01-22 | Nant Holdings Ip, Llc | Content Activation Via Interaction-Based Authentication, Systems and Method |
US20130254036A1 (en) * | 2012-03-23 | 2013-09-26 | John Trinh | Method and/or System for User Authentication with Targeted Electronic Advertising Content through Personal Communication Devices |
US20150006474A1 (en) * | 2013-06-28 | 2015-01-01 | Pingstripe, Inc | Secure cloud based document storage and management system and method |
US20150304322A1 (en) * | 2014-04-16 | 2015-10-22 | iAccess Technologies Inc. | System and method for vascular mapping authentication |
US20160036798A1 (en) * | 2014-08-04 | 2016-02-04 | Mobile Search Security LLC | Secure mobile contact system (smcs) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112311949A (en) * | 2019-07-31 | 2021-02-02 | 佳能株式会社 | Image forming apparatus, control method thereof, and storage medium storing computer program |
US11363167B2 (en) | 2019-07-31 | 2022-06-14 | Canon Kabushiki Kaisha | Image forming apparatus, method for controlling image forming apparatus, and storage medium storing computer program |
Also Published As
Publication number | Publication date |
---|---|
US10789351B2 (en) | 2020-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601866B2 (en) | Discovering website phishing attacks | |
US10313352B2 (en) | Phishing detection with machine learning | |
US10666670B2 (en) | Managing security breaches in a networked computing environment | |
US20200389495A1 (en) | Secure policy-controlled processing and auditing on regulated data sets | |
US10360402B2 (en) | Intercepting sensitive data using hashed candidates | |
US9083729B1 (en) | Systems and methods for determining that uniform resource locators are malicious | |
US10958657B2 (en) | Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems | |
US10142290B1 (en) | Host-based firewall for distributed computer systems | |
US20150326622A1 (en) | Generating a form response interface in an online application | |
US11563727B2 (en) | Multi-factor authentication for non-internet applications | |
US11122069B2 (en) | Detecting compromised social media accounts by analyzing affinity groups | |
US20190251019A1 (en) | Testing web applications using clusters | |
US20180032748A1 (en) | Mobile device photo data privacy | |
CN106030527B (en) | By the system and method for application notification user available for download | |
CN112602084B (en) | System and method for identifying data leakage | |
US10789351B2 (en) | Facilitating resolution of a human authentication test | |
US9904662B2 (en) | Real-time agreement analysis | |
US11363038B2 (en) | Detection impersonation attempts social media messaging | |
US20240146749A1 (en) | Threat relevancy based on user affinity | |
US20240107344A1 (en) | Systems and methods for autonomous program signature generation | |
US11736336B2 (en) | Real-time monitoring of machine learning models in service orchestration plane | |
EP4343594A1 (en) | Systems and methods for autonomous program classification generation | |
US11768902B2 (en) | System and method for providing content to a user | |
US20230394104A1 (en) | System and method of a cloud server for providing content to a user | |
US11310660B2 (en) | Identifying network risk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FEEZELL, JOHN R.;RODRIGUEZ BRAVO, CESAR AUGUSTO;REEL/FRAME:041235/0769 Effective date: 20170209 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FEEZELL, JOHN R.;RODRIGUEZ BRAVO, CESAR AUGUSTO;REEL/FRAME:041235/0769 Effective date: 20170209 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: KYNDRYL, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:057885/0644 Effective date: 20210930 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |